To search, Click below search items.
All Published Papers Search Service
Title
User¡¯s authorization in singularity operating system
Author
Rami Matarneh, Suha Al_Jubori
Vol. 9 No. 2 pp. 439-445
Keywords
Access Controller, Certificate Authority, Access Control Lists, Singularity
A Linux Implementation of Windows ACLs
William Mahoney, James Harr
Vol. 10 No. 7 pp. 1-7
Linux, Access Control Lists, File Security
Evaluating Layer 3 Device Tunneling and Access Control List Security Bandwidths Using B-Node Theory
S P Maj, D Veal
Vol. 10 No. 9 pp. 127-135
Network Security, B-Nodes, Access Control Lists, Tunneling